82Articles
9Categories
2024-10-03Date
🚨
Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber AttacksThe Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new vulnerability to its Known Exploited Vulnerabilities Catalog. This vulnerability, CVE-2024-29824, affects Ivanti Endpoint Manager (EPM) and has become a target for cybercriminals using…
KEV
🚨
Critical Ivanti flaw finds in-the-wild RCE despite available patchesThe US Cybersecurity and Infrastructure Security Agency (CISA) has warned Ivanti customers of active exploitation of a critical Endpoint Manager (EPM) vulnerability allowing remote code execution (RCE) that the company fixed in May 2024. Tracked as CVE-2024-29824 , the flaw is an…
KEV
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation. CVE-2024-45519 Synacor Zimbra Collaboration Command Execution Vulnerability These types of vulnerabilities are frequent attack vectors for malicio…
KEV
🐛
Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch
KEV
🐛
Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems
🐛
Chromium: CVE-2024-7025 Integer overflow in Layout
🐛
Chromium: CVE-2024-9369 Insufficient data validation in Mojo
🐛
Chromium: CVE-2024-9370 Inappropriate implementation in V8
⚠️
AI could provide the cyber-risk crystal ball every CISO needs
⚠️
LockBit Ransomware and Evil Corp Leaders Arrested and Sanctioned in Joint Global Effort
⚠️
Weird Zimbra Vulnerability
⚠️
Meta partners with banks in the UK to combat online scams
⚠️
When CUPS Runneth Over: The Threat of DDoS
⚠️
Telegram revealed it shared U.S. user data with law enforcement
⚠️
Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems
⚠️
A Single Cloud Compromise Can Feed an Army of AI Sex Bots
⚠️
Tick tock.. Operation Cronos arrests more LockBit ransomware gang suspects
⚠️
Ivanti EPM Vulnerability Exploited In The Wild
KEV
⚠️
Zero-Day Breach At Rackspace Sparks Vendor Blame Game
⚠️
14 DrayTek Vulns Patched, Including RCE Flaw
⚠️
CISA issues warning about another Ivanti flaw under active attack
⚠️
CISA Releases Three Industrial Control Systems Advisories
⚠️
Fix for BGP routing insecurity ‘plagued by software vulnerabilities’ of its own, researchers find
⚠️
DDoS attacks are increasingly targeting critical infrastructure
⚠️
Analyzing Malware at Scale - John Hammond - PSW #845
⚠️
Pixel's Proactive Approach to Security: Addressing Vulnerabilities in Cellular Modems
KEV
⚠️
Evaluating Mitigations & Vulnerabilities in Chrome
⚠️
Over 4,000 Adobe Commerce, Magento shops hacked in CosmicSting attacks
⚠️
Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks
⚠️
Breach Roundup: AI 'Nudify' Sites Serve Malware
⚠️
Recently patched CUPS flaw can be used to amplify DDoS attacks
📋
Tor Browser 13.5.6 Released – What’s New!
📢
Make OT networks a priority, say nine national security agencies
📢
Doppler Launches ‘Change Requests’ to Strengthen Secrets Management Security with Audited Approvals
📢
Drupal security advisory (AV24-559)
📢
Global Cybersecurity Agencies Release OT Security Guidelines
📢
ENISA 2024: Ransomware and AI Are Posing New Cyberthreats
📢
CISA Preparing to Assess Federal Zero Trust Progress
🔥
Northern Ireland Police to Pay £750,000 Fine Following Data Breach
🔥
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks
🔥
New VPN Credential Attack Goes to Great Lengths to Obtain Access
🔥
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks
🔥
Dutch Police: ‘State actor’ likely behind recent data breach
🔥
China-Backed APT Group Culling Thai Government Data
🔥
600,000 Prison Inmates to Share in $6.49M Breach Settlement
🕵️
Meta smart glasses can be used to dox anyone in seconds, study finds
🕵️
Kickstart Your DShield Honeypot [Guest Diary], (Thu, Oct 3rd)
🕵️
ISC Stormcast For Thursday, October 3rd, 2024 https://isc.sans.edu/podcastdetail/9164, (Thu, Oct 3rd)
🕵️
ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats
🕵️
FIN7 Gang Hides Malware in AI “Deepnude” Sites
🕵️
North Korea Profits as 'Stonefly' APT Swarms US Co's.
🕵️
Trends: Hardware gets AI updates in 2024
🕵️
CIA Seeks Informants In North Korea, Iran, And China
🕵️
Millions of Enterprises at Risk: SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions
🕵️
Webinar Announcement: Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP
🕵️
Quantum Breakthroughs Drive New Encryption Strategies
🕵️
Cybercriminal Gang Targeting SMBs Using Business Email Compromise
🕵️
Don’t Put Real Answers Into Your Password Reset Questions
🕵️
News alert: Upcoming webinar highlights threat mitigation, fortifying ‘ASM’ with Criminal IP
🕵️
Linux malware “perfctl” behind years-long cryptomining campaign
🕵️
Cryptohack Roundup: Guilty Plea in $37M Theft Case
🕵️
News alert: SquareX shows how Google’s MV3 standard falls short, putting millions at risk
🕵️
News alert: Doppler fortifies ‘secrets management’ with Change Requests auditable approval feature
🕵️
US, Microsoft Seize Domains Used in Russian Spear-Phishing
🕵️
A Leader in 2024 Forrester Enterprise Firewall Solutions Wave
🕵️
CyberRiskTV Live Coverage from Oktane 2024 - Day 2
🕵️
CyberRiskTV Live Coverage from Oktane 2024 - Day 1
🌐
Linux malware “perfctl” behind years-long cryptomining campaign
🌐
New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking
📡
Rogue AI: What the Security Community is Missing
📡
INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa
📡
Joint guidance on the principles of operational technology cyber security
📡
Ransowmare Crew Infects 100+ Orgs Monthly With New MedusaLocker Variant
📡
Differential fuzzing for cryptography
📡
Why your password policy should include a custom dictionary
📡
The Secret Weakness Execs Are Overlooking: Non-Human Identities
📡
Cloudflare blocks largest recorded DDoS attack peaking at 3.8Tbps
📡
Fraudsters imprisoned for scamming Apple out of 6,000 iPhones
📡
How to snoop on what an Apple Vision Pro user is typing | Kaspersky official blog
📡
Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure
📡
‘Pig butchering’ trading apps found on Google Play, App Store
📡
Why your password policy should include a custom dictionary wordlist